Deterrence theory in the cyber - century . Lessons from a state - of - the - art literature review

نویسندگان

  • Tobias Metzger
  • Leon Panetta
چکیده

Cyberattacks from a variety of perpetrators are constantly rising. To achieve restraint from attacks, deterrence theory has long been considered a valuable concept. How do criticisms of classical deterrence apply in this relatively new domain, and how does cyberdeterrence differ? Can offensive cyber capabilities be effective in deterring adversaries or must kinetic retaliation be “on the table”? Freedman differentiates deterrence-by-retaliation and deterrence-by-denial; immediate versus general; narrow versus broad; and central versus extended deterrence. The authors argue for denial and retaliation as complimentary parts of an overall strategy consisting of resistance, resilience and responses. Unlike nuclear deterrence, cyberdeterrence is not a game of great powers or that of nation-states alone and grey zones serve only rogue actors in the medium-term. Only the establishment of clear rules, similar to the Budapest Cybercrime Convention, enables effective responses to prevailing threats. Agreement on international rules on civilian critical infrastructures would move the superficial discussion on whether or not cyberattacks are legitimate to the more relevant debate on which targets are acceptable, providing clarity for the development of effective military strategy.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Review on Cyberspace Security: Lessons for Islamic Republic of Iran

Today governments face a threat by cyber attacks capable of disrupting communicative, economic and vital services that cause severe damages and losses. It has been years that Islamic republic of Iran benefits from cyberspace in different military and civilian sectors. Sensitive national centers such as nuclear facilities and Ministry of Oil have been targeted by individuals, groups and governme...

متن کامل

A Century of Internal Auditing -Using Computational Literature Review

A review of the internal audit literature over the past century reveals a significant topic variety and thematic diversity, so that a systematic review of these studies is necessary in order to gain a deeper understanding of internal audit research. This research aims to fill the gap in previous review research and in response to the recommendation of Behrend & Eulerich (2019) and aims to ident...

متن کامل

Chronicle of Datura Toxicity in the 18th and 19th Century

Background: Datura stramonium is a poisonous and common flowering plant that is a member of the Solanacae family. Datura poisonings are a rare occurrence in the 21st century, making toxicological information on this plant sparse. Historical information on Datura provides useful information on the clinical symptoms and characteristics of poisonings. This review looks at the state of knowledge on...

متن کامل

Deterrence of Cyber Attacks and U.S. National Security

This paper draws on deterrence theory to analyze the challenges that the United States faces in deterring cyber attacks. We begin by briefly reviewing the basic logic of deterrence theory and relating it to the challenge posed by cyber attacks. The following section explores what is commonly viewed as the key problem in deterring cyber attacks—the “attribution problem” arises when a state canno...

متن کامل

Critique of Plays From Behind the Glasses in The Light of New Historicism, A review and critique of the play from Behind the Glasses: Tayyebeh Nasrollahi

From Behind the Glasses in The Light of New Historicism  A review and critique of the play From Behind the Glasses Tayybeh Nasrollahi   PhD student of Persian language and literature, Allameh Tabataba'i University  [email protected]   Abstract From the perspective of modern historicism, literature and history are influenced by the forces of cultural discourse and social action. New ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2016